I found a question worded similarly to the following:
Which of the following best describes the following firewall configuration issues?
- Current firewall logs are excessively large with useless data
- Currently, the “any-any” rule type is in place
A. Clean-up rule, stealth rule
B. Stealth rule, silent rule
C. Silent rule, negate rule
D. Stealth rule, silent rule
The answer is "C" with the an explanation similar to the following:
- Silent rule: Drop "noisy" traffic without logging it. This reduces log sizes by not responding to packets that are deemed unimportant.
- Stealth rule: Disallows access to firewall software from unauthorized systems.
- Cleanup rule: The last rule in the rule base, which drops and logs any traffic that does not meet preceding rules.
- Negate rule: Used instead of the broad and permissive "any rules." Negate rules provide tighter permission rights by specifying what system can be accessed and how.
Please help me understand the logic behind answer "C".
Edit: If you want to review the original verbiage of the question, it is based on #33 from the AIO book on page 751.